Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction.

(True/False)
4.9/5
(42)

As an IT resource, information includes data in all their forms that are input, processed and output by information systems.

(True/False)
4.9/5
(35)

The ___________________________________logs and monitors who is on or is trying to access the network.

(Short Answer)
4.9/5
(28)

______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.

(Short Answer)
4.8/5
(35)

The ___________________________________ coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

(Short Answer)
4.7/5
(38)

Systems documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

(True/False)
4.8/5
(38)

The system of controls used in this text consists of the control environment, pervasive control plans, IT general controls, and business process (and application) control plans.

(True/False)
4.7/5
(42)

Application controls restrict access to data, programs, and documentation.

(True/False)
4.9/5
(35)

Within the data center, the data librarian function grants access to programs, data, and documentation to authorized personnel only.

(True/False)
4.8/5
(34)

The disaster recovery strategy known as a cold site is a fully equipped data center that is made available to client companies for a monthly subscriber fee.

(True/False)
4.9/5
(37)

Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate or resume operations with a minimum of disruption.

(True/False)
4.8/5
(45)

The function composed of people, procedures, and equipment that is typically called the information systems department, IS department, or the IT department is the information systems organization.

(True/False)
4.7/5
(34)

In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

(True/False)
4.8/5
(46)

Which of the following statements related to denial of service attacks is false?

(Multiple Choice)
4.9/5
(38)

Continuity is the process of using backup measures to restore lost data and resume operations.

(True/False)
4.9/5
(32)

Program documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.

(True/False)
4.7/5
(44)

The ______________________________ maintains custody of and controls access to programs, files, and documentation.

(Short Answer)
4.9/5
(38)

A warehouse clerk manually completing an order document and forwarding it to purchasing for approval is an example of:

(Multiple Choice)
4.8/5
(37)

Access control software ensures that only authorized users gain access to a system through a process of identification and authentication.

(True/False)
4.8/5
(38)

The _________________________ describes user procedures for an application and assists the user in preparing inputs and using outputs.

(Short Answer)
4.8/5
(35)
Showing 41 - 60 of 157
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)